{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:50:08Z","timestamp":1770223808976,"version":"3.49.0"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2020,2,29]],"date-time":"2020-02-29T00:00:00Z","timestamp":1582934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61602092 and 61972073"],"award-info":[{"award-number":["61602092 and 61972073"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Research Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","award":["2019-MS-05"],"award-info":[{"award-number":["2019-MS-05"]}]},{"name":"Research Grants Council of Hong Kong","award":["CRF C7036-15G"],"award-info":[{"award-number":["CRF C7036-15G"]}]},{"name":"National Key R8D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2020,2,29]]},"abstract":"<jats:p>\n            Encrypted deduplication combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mainly build on deterministic encryption to preserve deduplication effectiveness. However, such deterministic encryption reveals the underlying frequency distribution of the original plaintext chunks. This allows an adversary to launch frequency analysis against the ciphertext chunks and infer the content of the original plaintext chunks. In this article, we study how frequency analysis affects information leakage in encrypted deduplication, from both attack and defense perspectives. Specifically, we target backup workloads and propose a new inference attack that exploits\n            <jats:italic>chunk locality<\/jats:italic>\n            to increase the coverage of inferred chunks. We further combine the new inference attack with the knowledge of chunk sizes and show its attack effectiveness against variable-size chunks. We conduct trace-driven evaluation on both real-world and synthetic datasets and show that our proposed attacks infer a significant fraction of plaintext chunks under backup workloads. To defend against frequency analysis, we present two defense approaches, namely MinHash encryption and scrambling. Our trace-driven evaluation shows that our combined MinHash encryption and scrambling scheme effectively mitigates the severity of the inference attacks, while maintaining high storage efficiency and incurring limited metadata access overhead.\n          <\/jats:p>","DOI":"10.1145\/3365840","type":"journal-article","created":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T09:45:08Z","timestamp":1585475108000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Information Leakage in Encrypted Deduplication via Frequency Analysis"],"prefix":"10.1145","volume":"16","author":[{"given":"Jingwei","family":"Li","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China; State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4501-4364","authenticated-orcid":false,"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"given":"Chufeng","family":"Tan","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,3,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2014. FSL Traces and Snapshots Public Archive. Retrieved from http:\/\/tracer.filesystems.org\/.  2014. FSL Traces and Snapshots Public Archive. Retrieved from http:\/\/tracer.filesystems.org\/."},{"key":"e_1_2_1_2_1","unstructured":"2019. Ubuntu IRC Logs. Retrieved from http:\/\/irclogs.ubuntu.com.  2019. Ubuntu IRC Logs. Retrieved from http:\/\/irclogs.ubuntu.com."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_21"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119291866801"},{"key":"e_1_2_1_5_1","first-page":"64","article-title":"Backup to the future: How workload and hardware changes continually redefine data domain file systems","volume":"50","author":"Allu Yamini","year":"2017","journal-title":"IEEE Trans. Comput."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Amvrosiadis George","year":"2015"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 24th International Conference on Large Installation System Administration (LISA\u201910)","author":"Anderson Paul","year":"2010"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813630"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053019"},{"key":"e_1_2_1_10_1","unstructured":"Michael Arrington. 2006. AOL: \u201cThis Was a Screw Up.\u201d Retrieved from https:\/\/techcrunch.com\/2006\/08\/07\/aol-this-was-a-screw-up\/.  Michael Arrington. 2006. AOL: \u201cThis Was a Screw Up.\u201d Retrieved from https:\/\/techcrunch.com\/2006\/08\/07\/aol-this-was-a-screw-up\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_23"},{"key":"e_1_2_1_12_1","volume-title":"Proceeding of the 22nd USENIX Security Symposium (USENIX Security\u201913)","author":"Bellare Mihir","year":"2013"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236217"},{"key":"e_1_2_1_16_1","volume-title":"Proceeding of the USENIX Annual Technical Conference (USENIX ATC\u201906)","author":"Black John","year":"2006"},{"key":"e_1_2_1_17_1","volume-title":"Proceeding of the International Workshop on Privacy Enhancing Technologies (PET\u201905)","author":"Brekne T\u00f8nnes","year":"2005"},{"key":"e_1_2_1_18_1","unstructured":"Andrei Z. Broder. 1997. On the resemblance and containment of documents. In Proceeding of the Compression and Complexity of Sequences (SEQUENCES\u201997). 21--29.  Andrei Z. Broder. 1997. On the resemblance and containment of documents. In Proceeding of the Compression and Complexity of Sequences (SEQUENCES\u201997). 21--29."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI\u201902)","author":"Cox Landon P."},{"key":"e_1_2_1_21_1","unstructured":"Barb Darrow. 2015. Harvard-affiliate McLean Hospital Loses Patient Data. Retrieved from http:\/\/fortune.com\/2015\/07\/29\/mclean-hospital-loses-patient-data\/.  Barb Darrow. 2015. Harvard-affiliate McLean Hospital Loses Patient Data. Retrieved from http:\/\/fortune.com\/2015\/07\/29\/mclean-hospital-loses-patient-data\/."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851884"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3129633.3129637"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664169"},{"key":"e_1_2_1_26_1","unstructured":"Sanjay Ghemawat and Jeff Dean. 2014. LevelDB: A Fast Key\/Value Storage Library by Google. Retrieved from https:\/\/github.com\/google\/leveldb.  Sanjay Ghemawat and Jeff Dean. 2014. LevelDB: A Fast Key\/Value Storage Library by Google. Retrieved from https:\/\/github.com\/google\/leveldb."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978351"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.44"},{"key":"e_1_2_1_29_1","unstructured":"Robert Hackett. 2016. LinkedIn Lost 167 Million Account Credentials in Data Breach. Retrieved from http:\/\/fortune.com\/2016\/05\/18\/linkedin-data-breach-email-password\/.  Robert Hackett. 2016. LinkedIn Lost 167 Million Account Credentials in Data Breach. Retrieved from http:\/\/fortune.com\/2016\/05\/18\/linkedin-data-breach-email-password\/."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046765"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.187"},{"key":"e_1_2_1_32_1","unstructured":"HIPAA Journal. 2017. Hard Drive Theft Sees Data of 1 Million Individuals Exposed. Retrieved from https:\/\/www.hipaajournal.com\/hard-drive-theft-sees-data-1-million-individuals-exposed-8859\/.  HIPAA Journal. 2017. Hard Drive Theft Sees Data of 1 Million Individuals Exposed. Retrieved from https:\/\/www.hipaajournal.com\/hard-drive-theft-sees-data-1-million-individuals-exposed-8859\/."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201912)","author":"Islam Mohammad Saiful","year":"2012"},{"key":"e_1_2_1_34_1","volume-title":"Proceeding of the Israeli Experimental Systems Conference (SYSTOR\u201909)","author":"Jin Keren"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the USENIX Conference on File and Stroage Technologies (FAST\u201903)","author":"Kallahall Mahesh","year":"2003"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30115-8_22"},{"key":"e_1_2_1_38_1","volume-title":"Proceeding of the USENIX Conference on File and Storage Technologies (FAST\u201910)","author":"Kruus Erik","year":"2010"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242657"},{"key":"e_1_2_1_40_1","volume-title":"Paterson","author":"Lacharit\u00e9 Marie-Sarah","year":"2015"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2019.00007"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.28"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201915)","author":"Li Mingqiang"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591292"},{"key":"e_1_2_1_45_1","volume-title":"Proceeding of the USENIX Conference on File and Storage Technologies (FAST\u201909)","author":"Lillibridge Mark","year":"2009"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813623"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2016.7897081"},{"key":"e_1_2_1_48_1","volume-title":"Vanstone","author":"Menezes Alfred J.","year":"2001"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST\u201911)","author":"Dutch"},{"key":"e_1_2_1_50_1","volume-title":"Proceeding of the 22nd ACM Conference on Computer and Communications Security (CCS\u201915)","author":"Naveed Muhammad"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201914)","author":"Naveed Muhammad"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 23th ACM Conference on Computer and Communications Security (CCS\u201916)","author":"Pouliot David"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032966"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996432"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the USENIX Conference on Usenix Annual Technical Conference (USENIX ATC\u201915)","author":"Shah Peter","year":"2015"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the Conference on Advances in Cryptology (ASIACRYPT\u201911)","author":"Shi Elaine","year":"2011"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS\u201908)","author":"Storer Mark W."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2016.7897080"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the USENIX Conference on Annual Technical Conference (USENIX ATC\u201912)","author":"Tarasov Vasily","year":"2012"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the AAAI Spring Symposium. 99--102","author":"David"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208465"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456474"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2571298"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201911)","author":"Xia Wen","year":"2011"},{"key":"e_1_2_1_66_1","volume-title":"Proceeding of the 25th USENIX Security Symposium (Security\u201916)","author":"Zhang Yupeng","year":"2016"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201908)","author":"Zhu Benjamin"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:36Z","timestamp":1750202616000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365840"}},"subtitle":["Attacks and Defenses"],"short-title":[],"issued":{"date-parts":[[2020,2,29]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2,29]]}},"alternative-id":["10.1145\/3365840"],"URL":"https:\/\/doi.org\/10.1145\/3365840","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,29]]},"assertion":[{"value":"2019-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}